Sunday 3 July 2016

MIT3042 smu mSC IT spring 2016 (jul/aug 2016 exam) iiiRD sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 3
SUBJECT CODE &
NAME
MIT3042Embedded Systems
Qus:1 What are the various categories of Embedded Systems? Explain.
Answer:
The various categories of Embedded Systems:
Embedded Systems are categorized into the following types:

1. Stand-alone embedded systems
2. Real-time embedded systems
3.


Qus:2 What is a microcontroller? List the salient features of 8051 microcontroller.
Answer:
Microcontroller:
A microcontroller is an integrated chip that has processor, memory and several other hardware units in it. These form the microcomputer part of the embedded system. Microcontrollers are particularly suited for use in embedded systems for real-time control applications with on-chip program memory and devices. Figure below shows the functional circuits present (in solid boundary

Qus:3 List the various types of addressing modes in 8051 and explain any three.
Answer:
The various types of addressing modes in 8051:
The various ways of accessing data are called addressing modes. The various addressing modes of 8051 are:

·         Immediate Addressing Mode

Qus:4 What are the RTOS kernel components? Explain.
Answer:
The RTOS kernel components:
Real-Time Operating System (RTOS) is a multitasking operating system intended for real-time applications. A real-time operating system (RTOS) is a type of operating system designed to support real-time programmes, i.e., programmes that interact with the outside world and have to respond

Qus:5 What are the functions that interrupt and event handling mechanism of an RTOS provide?
Answer:
The functions that interrupt and event handling mechanism of an RTOS provide:

The interrupt and event handling mechanism of an RTOS provides the following functions:

·         Defining
·          


Qus:6 Write a note on I²C Bus.
Answer:
I²C Bus:
I²C (Inter-Integrated Circuit) generically referred to as "two-wire interface" is a multi-master serial


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


mca5043 smu mca spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
MCA(Revised Fall 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5043– Data Warehousing and Data Mining

1 Explain the Top-Down and Bottom-up Data Warehouse development Methodologies.

Answer: Despite the fact that Data Warehouses can be designed in a number of different ways, they all share a number of important characteristics. Most Data Warehouses are Subject Oriented. This means that the

2 Differentiate E-R modeling and Dimensional Modeling

Answer: E - R Modeling
Entity - Relationship modeling is a very popular method for designing databases. E-R modeling, as it is often called, may be described as a topdown approach, in that it encourages looking at the “big picture" first. We begin by describing the world in terms of entity types that are related to one another in various


3 What is repository? How is it helpful to the data warehouse maintenance?

Answer: A Data Mart is a repository of data gathered from operational data and other sources that is


4 List and explain the Strategies for data reduction.

Answer: Data reduction techniques can be applied to obtain a reduced representation of the data set that is much smaller in volume, yet closely maintains the integrity of the original data. That is, mining on the reduced data set should be more efficient yet produce the same (or almost the same)


5 Describe K-means method for clustering. List its advantages and drawbacks.

Answer: K-means (MacQueen, 1967) is one of the simplest unsupervised learning algorithms that solve the well known


6 Explain how Data Mining is useful in telecommunications.

Answer: The following are a few topics where data mining improve telecommunication services.
Multidimensional Analysis of Telecommunication Data: Telecommunication data are intrinsically with

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mca5042 smu mca spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5042- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

Answer: Caesar’s Cipher encryption technique
The Caesar cipher has an important place in history. Julius Caesar is said to have been the first to use this scheme, in which each letter is translated to a letter a fixed number of places after it in the alphabet. Caesar used a



2 Explain data encryption standard (DES).

Answer: The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad.


3 Describe the principles of Public-Key Cryptosystems.

Answer: Public-key cryptography is a radical departure from all that has gone before. Right up to modern times all cryptographic systems have been based on the elementary tools of substitution and permutation. However, public-key algorithms are based on mathematical functions and are asymmetric in

4 Write short notes on
a) Digital signature
b) Attacks on digital signature

Answer: a) Another typical situation parallels a common human need: an order to transfer funds from one person to another. In other words, we want to be able to send electronically the equivalent of a computerized check. We understand how this transaction is handled in the conventional, paper

5 Explain IP security policy

Answer: To start the IP Security Policy Management snap-in
To start the IP Security Policy Management snap-in from the Microsoft Management Console:

Click Start, click Run, type MMC, and then click OK.


6 Write a note on Wireless Transport Layer Security (WTLS).

Answer: Wireless Transport Layer Security (WTLS) is a security protocol, part of the Wireless Application Protocol (WAP) stack. It sits between the WTP and WDP layers in the WAP

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mca5033 smu mca spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5033-OPEN SOURCE DB SYSTEMS

1 Explain ACID properties in transaction management.

Answer: ACID properties are an important concept for databases. The acronym stands for Atomicity, Consistency, Isolation, and Durability.

The ACID properties of a DBMS allow safe sharing of data. Without these ACID properties, everyday occurrences such

2 What are the different strategies of OSS licensing? Explain briefly.

Answer: OSS licensing strategies which are given below:
Ø  Expansion strategy: It is an open source demonstration of the “law of conservation of modularity”

3 Explain the SELECT and PROJECT operations.

Answer: Relational Algebra Operators are mathematical functions used to retrieve queries by describing a sequence operations on tables or even databases(schema) involved.[1] With relational algebra operators, a

4 Explain MySQL Administration

Answer: Running and Shutting down MySQL Server:
First check if your MySQL server is running or not. You can use the following command to check this:

 ps -ef | grep mysqld
If your


5 Write short notes on:
a) Ingres
b) Postgres
c) Postgres95
d) PostgreSQL7
e) PostgreSQL8

Answer: Ingres
Ingres, a research project to create a relational database, was a project in the early 1970s at the University of California, Berkeley. This was the starting of the research and later many other databases


6 Describe Availability with respect to InnoDB.

Answer: You have decided to change one or more tables from MyISAM to InnoDB. That should be as simple as ALTER TABLE foo ENGINE=InnoDB. But you have heard that there might be some subtle

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mca5032 smu mca spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5032- WIRELESS AND MOBILE COMMUNICATION

1 Describe Wireless Communication. Explain its advantages

Answer: Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and

2 Describe any five GSM PLMN basic services.

Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone


3 Explain the use of control channels in GSM network.

Answer: The channels may also be divided into common and dedicated channels. The forward common channels are used for paging to inform a mobile of an incoming call, responding to channel requests, and broadcasting bulletin board information. The return common channel is a random access channel used by the mobile to request channel resources
4 What is CDMA? Explain the history of CDMA.

Answer: CDMA stands for Code Division Multiple Access and in the cellular world, CDMA technology was originally known as IS-95. Basically CDMA is a "spread spectrum" technology that has been used in digital cellular radio communications and advanced wireless technologies, and allows many users to occupy the same time and frequency allocations in a given


5 Identify detailed implementation about A5 algorithm?

Answer: A5 Algorithm An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (

6 List and explain the different path loss models.

Answer: Path Loss Models
Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412